Yasir Arfat Malkani

Yasir Arfat Malkani
University of Sindh · Institute of Mathematics and Computer Science

PhD

About

32
Publications
18,327
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
135
Citations
Citations since 2017
8 Research Items
65 Citations
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015
Additional affiliations
October 2006 - December 2010
University of Sussex
Position
  • PhD Student
January 2004 - present
University of Sindh
Position
  • Professor (Associate)

Publications

Publications (32)
Article
Due to the rapid growth of small and smart hand-held devices, mobile ad hoc networks (MANets) are becoming very common nowadays. MANets may consist of a number of small hand-held devices having limited resources in terms of memory, battery and processing power. In order to provide services to the users, these devices are capable of communicating wi...
Chapter
Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many...
Chapter
Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many...
Article
Full-text available
Over the past decades, e-commerce have switched to Web services. Web services offers flexibility and interoperability of independent functions that are platform independent software applications and perform a specific task. Private and public institutions in the developed nations are offering web services. These include service such as online appoi...
Conference Paper
Pervasive computing offers environments in which user needs or tasks are fulfilled without demanding their attention. Context-aware service composition is a central aspect to achieving this, in which services are discovered and composed in response to context to meet user needs. Since pervasive computing environments are inherently dynamic and hete...
Conference Paper
Full-text available
Security in Wireless Sensor Networks has remained one of the critical and active research realms since last decade. Due to their applications, WSNs are subjective to be deployed in physically hostile environments, where they are vulnerable to various security attacks. The security issue becomes more challenging when sensor nodes are supposed to be...
Article
Full-text available
Context-aware adaptation is a rudimentary prerequisite for pervasive computing applications. It enables applications to adapt themselves in response to contextual changes in order to satisfy user needs and improve user experience with minimal or no user intervention. In existing adaptation approaches, various concerns involved in adaptation process...
Conference Paper
Wireless Sensor Network (WSNs) are commonly deployed in hostile (unattended) and open environments, where it is easy for an attacker to physically capture some of the legitimate nodes, copy credentials, reprogram them and re-deploy them in the WSN. Such type of attack is called Node Replication or Clone Node Attack. With this attack an attacker can...
Article
Full-text available
WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or mor...
Conference Paper
Full-text available
Pervasive Computing Environments are composed of heterogeneous services. Pervasive computing applications need to discover the service(s) based on context (e.g. user preferences, user location, user activity, etc) and interact with them to perform tasks that support us in everyday life with minimal or no user distraction. This makes discovery proto...
Article
Full-text available
Security and privacy remain to be a major concern for the computing world – from traditional wired networks to modern mobile ad-hoc networks (MANETs) and ubiquitous/pervasive computing systems. Ubiquitous computing systems vary from conventional computing systems due to several reasons, such as ubiquitous computing systems are by nature ad hoc, mor...
Article
Full-text available
Ubiquitous computing systems are becoming more common nowadays. Usually, these systems are composed of several modern hand-held devices, which support wireless communication in some form, such as WiFi, IrDA, Bluetooth, etc. Since wireless communication is open to everyone, the issue is how to pair two unassociated devices securely. Consequently, a...
Article
Full-text available
Recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and...
Article
Full-text available
Sindhi language is primarily spoken in the Sindh province of Pakistan, and in some parts of India. Languages phonemic inventory include vowels, consonants and diphthongs. This paper presents acoustic analysis and properties of the glide consonants of Sindhi. Glides are considered having stable and predictable formant structure and associated acoust...
Article
Full-text available
A number of traffic characterization studies have been carried out on wireless LANs, which indicate that the wireless settings pose major challenges, especially for high bandwidth and delay sensitive applications. This paper aims to evaluate a number of Quality of Service (QoS) parameters related to video conferencing over three major WLAN Standard...
Article
Full-text available
Context-awareness is an essential requirement for pervasive computing applications, which enables them to adapt and perform tasks based on context. One of the adaptive features of context-awareness is contextual reconfiguration. Contextual reconfiguration involves discovering remote service(s) based on context and binding them to the application co...
Article
Full-text available
Context-aware adaptation is a central aspect of pervasive computing applications, enabling them to adapt and perform tasks based on contextual information. One of the aspects of context-aware adaptation is reconfiguration in which bindings are created between application component and remote services in order to realize new behaviour in response to...
Conference Paper
Full-text available
Ad-hoc interactions between devices over wireless networks present a security problem: the generation of shared secrets to initialize secure communication over a medium that is inherently vulnerable to various attacks. However, these scenarios can also build on physical security of spaces by using protocols in which users visibly demonstrate their...
Article
Full-text available
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computing systems due to the ad-hoc and spontaneous nature of interactions among devices. These systems are prone to security risks, such as eavesdropping and require different t...
Conference Paper
Secure Device Association (also known as security initialization, first-connect or simply pairing in the literature) can be referred as the process of establishing a secure channel between a pair of devices in close proximity. There have been many recent proposals to provide secure pairing of devices in close proximity. All vary in their security a...
Conference Paper
Continuous advancement in pervasive computing environment and proliferation of modern pervasive devices has increased interest in location aware applications, whereas determining location pose some special challenges. For example, pervasive computing applications require a well-defined representation of location knowledge to support location aware...
Conference Paper
Full-text available
Recently, video streaming has been extensively used for information broadcasting. Availability of improved and enhanced transmission facilities make it possible to use video streaming in fast real time applications. Real time video transmission is widely used in surveillance, conferencing, media broadcasting and applications that include remote ass...
Conference Paper
Tracking systems were first developed for the shipping industries to determine the position of ships and boats in the sea. Initially passive systems were developed to support in tracking and navigation for location-based applications. For the applications that require real time location information of the vehicle, these systems cannot be employed,...
Article
Full-text available
Co-location of devices is a useful basis for access control policies for ad-hoc connections, as physical security, visibility and social norms provide reassurances to the device owners and participants. There are various possible techniques for demonstrating co-location through physical interactions, which others have started to explore. In some ca...

Network

Cited By